Mobile Network Packet Analyzer for Kali
NetHunter
This feature will be an Android-compatible network packet
analysis tool that integrates with Kali NetHunter, allowing
penetration testers, network administrators, and cybersecurity
professionals to capture, analyze, and filter network packets
directly from a mobile device.
This feature will enhance Kali NetHunter by providing a
Wireshark-like packet analysis tool for mobile devices. It will
allow real-time network monitoring, deep packet inspection
(DPI), and anomaly detection while running efficiently on mobile
hardware.
Key Capabilities:
- Packet Capture & Analysis
- Capture live network traffic from WiFi, mobile data
(LTE/5G), and USB tethered interfaces.
- Support for TCP, UDP, ICMP, HTTP(S), DNS, and other
protocols.
- Deep Packet Inspection (DPI) to analyze payloads for
malicious activity.
- Real-Time Packet Filtering
- Users can filter captured packets based on source
IP, destination IP, ports, and protocols.
- Apply predefined security filters to detect
suspicious traffic
Expected Outcome:
- A standalone Android app module that integrates with Kali
NetHunter.
- A Dashboard to show various real-time traffic and captured
data.
Mobile-to-LoRa Communication Without a
SIM Card
Modern military operations require secure, high-bandwidth, and
resilient offline communication systems that can function
without SIM cards, Wi-Fi, or satellite networks. Current
solutions, such as SINCGARS radios and LoRaWAN, have bandwidth
and security limitations, making them vulnerable to jamming and
cyberattacks. A robust and secure data transfer system that
operates in contested environments is essential for mission
success.
Detailed Description:
The goal is to develop a highly secure, offline data transfer
system that can facilitate communication in jamming-prone and
network-denied environments while ensuring zero leakage of
personnel details such as location, identity, or
mission-critical data. The system should include:
Key Capabilities:
- Direct Bluetooth or Wi-Fi (ESP32) to LoRa Communication
- The mobile device communicates with the ESP32-LoRa
module using Bluetooth (BLE) or Wi-Fi
(ESP-Now/SoftAP).
- The ESP32-LoRa module acts as a gateway, taking the
message from the mobile and transmitting it over
LoRa to another LoRa device.
- On the receiving end, another ESP32-LoRa node
decodes the message and forwards it to a connected
mobile device.
- Communication Methods
- Mobile App → Bluetooth/Wi-Fi → ESP32-LoRa
→ LoRa Network → ESP32-LoRa →
Receiving Mobile
- Encrypted Text Messaging, Alerts, and GPS Location
Sharing
Expected Outcomes:
- A fully functional secure offline data transfer system
capable of operating without SIM cards and Wi-Fi ensuring
robust communication for military operations in
network-denied environments while guaranteeing no personnel
data or location leakage.
Self-Sovereign Identity (SSI) Mobile
App
Background:
Traditional identity management systems rely on centralized
authorities (governments, banks, and corporations) to issue,
verify, and store user identities. This leads to several
security and privacy risks, such as identity theft, unauthorized
access, data breaches, and lack of user control over personal
information. Moreover, users are often required to share more
personal data than necessary for identity verification (e.g.,
sharing an entire ID document to prove age).
Self-Sovereign Identity (SSI) allows users to control and share
only necessary identity attributes without relying on
third-party intermediaries. The challenge is to develop a mobile
application that enables secure, identity verification while
maintaining user privacy and control.
Objectives:
- Develop a mobile app for Academic Credential Verification
that allows users to create, store, and manage student
Self-Sovereign Identities (SSI).
- Implement best possible solution to allow users to prove
attributes (e.g., course credentials) without revealing full
transcripts.
Expected Outcome:
Mobile Application
- Mobile app for creating, managing, and sharing DIDs
& Verifiable Credentials.
- Secure Authentication System –
Login/authentication without passwords using
DID-based authentication.
Unveiling Vulnerabilities in Google
Approved Apps
Problem Statement:
Google Play Protect rigorously scans and verifies apps before
they are made available to users. However, even with these
stringent checks, vulnerabilities and security issues can
sometimes slip through the cracks. This hackathon challenges
participants to delve deep into the ecosystem of Google-approved
applications and uncover potential security flaws, privacy
concerns, and functional vulnerabilities.
Objective:
Participants are tasked with identifying and documenting
vulnerabilities, security issues, and potential privacy risks
within a selection of Google Play Store approved applications.
The goal is to develop tools, techniques, and PoC that can aid
in the continuous improvement of app security and user safety.
Specific Challenges:
- Vulnerability Discovery
- Privacy Analysis
- Functional Issues and Exploits
Expected Outcome:
- A detailed report outlining the discovered vulnerabilities,
privacy concerns, and functional issues in google approved
and authentic apps. The target apps would be Banking apps,
mParivahan, DigiYatra, UMANG, eshram, DigiLocker, COWIN,
,esanjeevani, ABHA and similar apps.
- Tools or scripts developed for vulnerability analysis.
Fraud and Phishing Detection Mobile
Application
Problem Statement:
The digital landscape is increasingly plagued by sophisticated
fraud tactics, ranging from deceptive messages and spam calls to
malicious app notifications and manipulative advertisements.
These attacks erode user trust, compromise personal data, and
inflict financial losses. This hackathon challenges participants
to develop innovative solutions for detecting, preventing, and
mitigating fraud across various digital communication channels.
Objective:
Participants will design and implement systems that can
effectively identify and counteract fraudulent activities within
the scope of messages (SMS, instant messaging), calls (voice,
VoIP), app notifications, advertisements, and spam. Though
rooting an Android device is not necessarily
required to execute these tasks. However, the
approach depends on the level of access and data analysis
required. The focus is on building robust and adaptable
solutions that can stay ahead of evolving fraud techniques.
Specific Challenges:
- Message Fraud Detection
- Call Fraud Detection
- App Notification Fraud
- Advertisement Fraud
- Email filters
- Link Analysis
Expected Outcome:
- A working prototype or proof-of-concept demonstrating the
developed anti-fraud solution.
Secure Military Messaging App with
End-to-End Encryption & Self-Destructing Messages
Problem Statement:
Military personnel require highly secure and private
communication channels for mission-critical operations. However,
existing messaging apps are vulnerable to interception, metadata
leaks, and forensic recovery, posing significant national
security risks. Even encrypted messaging platforms can leak
metadata, allowing adversaries to analyze communication patterns
and identify sensitive mission details.
The challenge is to develop a military-grade, metadata-resistant
messaging application that ensures encryption, self-destructing
messages.
Objectives:
- Implement Encryption to protect messages.
- Ensure metadata-resistant communication, preventing
adversaries from analyzing sender-receiver relationships.
- Enable self-destructing messages that leave no digital
traces after they are read.
Expected Outcome:
- Advanced Encryption & Privacy Features.
- Self-Destructing & Tamper-Proof Messaging.
Open- Source Debugging Tool for Android
Apps
Existing Android debugging tools, both open-source and
commercial, have limitations in automation, real-time
performance tracking, and integration with modern development
workflows. Commercial tools provide advanced features but are
often expensive and proprietary, restricting accessibility.
There is a need for an advanced open-source debugging tool that
surpasses existing solutions by incorporating cutting-edge
features, AI-powered automation, and deep system analytics while
ensuring seamless integration with Android development
environments.
Objectives
The goal is to develop a feature-rich, open-source debugging tool
exclusively for Android that provides superior debugging
capabilities compared to commercial tools. The solution should
include:
- Advanced Debugging & Logging: Real-time log filtering,
crash analysis, and event tracing.
- AI-Powered Issue Detection: Machine learning models to
predict, detect, and resolve common bugs automatically.
- Performance Insights: CPU, memory, and network usage
tracking with anomaly detection.
- Automated Error Resolution: AI-assisted suggestions and
auto-fix capabilities for common coding errors.
- Seamless Integration: Compatibility with Android Studio,
Jetpack tools, and CI/CD pipelines.
- Security & Privacy Focus: Ensure debugging logs and
analytics do not expose sensitive user data.
- Scalability & Extensibility: Allow plugin-based
enhancements for future debugging requirements.
Expected Outcome:
- A fully functional open-source debugging tool for Android,
surpassing existing commercial options in efficiency,
automation, and usability.